all: use wireguard module
This commit is contained in:
parent
97d2bcc6ae
commit
883b78da03
5 changed files with 43 additions and 101 deletions
|
@ -83,6 +83,7 @@
|
|||
lanzaboote.nixosModules.lanzaboote
|
||||
impermanence.nixosModules.impermanence
|
||||
home-manager.nixosModules.home-manager
|
||||
self.nixosModules.default
|
||||
./common
|
||||
./hosts/skipper
|
||||
./home
|
||||
|
@ -129,9 +130,9 @@
|
|||
}
|
||||
lix-module.nixosModules.default
|
||||
sops-nix.nixosModules.sops
|
||||
self.nixosModules.default
|
||||
./common
|
||||
./hosts/rico1
|
||||
self.nixosModules.default
|
||||
];
|
||||
};
|
||||
Rico2 =
|
||||
|
|
|
@ -1,4 +1,6 @@
|
|||
{ config, ... }: {
|
||||
imports = [ ../shared/wireguard.nix ];
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard/rico0/pk" = {
|
||||
mode = "400";
|
||||
|
@ -12,31 +14,14 @@
|
|||
};
|
||||
};
|
||||
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
nodeconfig.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
listen-port = 51830;
|
||||
pk-file = config.sops.secrets."wireguard/rico0/pk".path;
|
||||
psk-file = config.sops.secrets."wireguard/rico0/psk".path;
|
||||
node-ips = [
|
||||
"10.10.10.10/24"
|
||||
"fd7c:585c:c4ae::10/64"
|
||||
];
|
||||
listenPort = 51830;
|
||||
privateKeyFile = config.sops.secrets."wireguard/rico0/pk".path;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/rico0/psk".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,4 +1,6 @@
|
|||
{ config, ... }: {
|
||||
imports = [ ../shared/wireguard.nix ];
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard/rico1/pk" = {
|
||||
mode = "400";
|
||||
|
@ -12,31 +14,14 @@
|
|||
};
|
||||
};
|
||||
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
nodeconfig.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
listen-port = 51831;
|
||||
pk-file = config.sops.secrets."wireguard/rico1/pk".path;
|
||||
psk-file = config.sops.secrets."wireguard/rico1/psk".path;
|
||||
node-ips = [
|
||||
"10.10.10.11/24"
|
||||
"fd7c:585c:c4ae::11/64"
|
||||
];
|
||||
listenPort = 51831;
|
||||
privateKeyFile = config.sops.secrets."wireguard/rico1/pk".path;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/rico1/psk".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,4 +1,6 @@
|
|||
{ config, ... }: {
|
||||
imports = [ ../shared/wireguard.nix ];
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard/rico2/pk" = {
|
||||
mode = "400";
|
||||
|
@ -12,31 +14,14 @@
|
|||
};
|
||||
};
|
||||
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
nodeconfig.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
listen-port = 51832;
|
||||
pk-file = config.sops.secrets."wireguard/rico2/pk".path;
|
||||
psk-file = config.sops.secrets."wireguard/rico2/psk".path;
|
||||
node-ips = [
|
||||
"10.10.10.12/24"
|
||||
"fd7c:585c:c4ae::12/64"
|
||||
];
|
||||
listenPort = 51832;
|
||||
privateKeyFile = config.sops.secrets."wireguard/rico2/pk".path;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/rico2/psk".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
|
@ -1,4 +1,6 @@
|
|||
{ config, ... }: {
|
||||
imports = [ ../../shared/wireguard.nix ];
|
||||
|
||||
sops.secrets = {
|
||||
"wireguard/skipper/pk" = {
|
||||
mode = "400";
|
||||
|
@ -11,31 +13,15 @@
|
|||
group = config.users.users.root.group;
|
||||
};
|
||||
};
|
||||
networking.firewall.trustedInterfaces = [ "wg0" ];
|
||||
networking.wireguard = {
|
||||
|
||||
nodeconfig.wireguard = {
|
||||
enable = true;
|
||||
interfaces = {
|
||||
wg0 = {
|
||||
ips = [
|
||||
listen-port = 51822;
|
||||
pk-file = config.sops.secrets."wireguard/skipper/pk".path;
|
||||
psk-file = config.sops.secrets."wireguard/skipper/psk".path;
|
||||
node-ips = [
|
||||
"10.10.10.2/24"
|
||||
"fd7c:585c:c4ae::2/64"
|
||||
];
|
||||
listenPort = 51822;
|
||||
privateKeyFile = config.sops.secrets."wireguard/skipper/pk".path;
|
||||
peers = [
|
||||
{
|
||||
name = "Proxy";
|
||||
endpoint = "165.232.180.97:51821";
|
||||
publicKey = "NNw/iDMCTq8mpHncrecEh4UlvtINX/UUDtCJf2ToFR4=";
|
||||
presharedKeyFile = config.sops.secrets."wireguard/skipper/psk".path;
|
||||
persistentKeepalive = 20;
|
||||
allowedIPs = [
|
||||
"10.10.10.0/24"
|
||||
"fd7c:585c:c4ae::0/64"
|
||||
];
|
||||
}
|
||||
];
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue